Results 71 to 80 of about 429,644 (328)
Research on Security of Virtualization on Cloud Computing
In recent years,followed by developing and popularizing of cloud computing service,the security problems appear. One of the problems,virtualization security,draws most attention of cloud services providers and security manufacturers.
Xiaodi Wang+4 more
doaj +2 more sources
Halogen Bonding‐Enabled Stabilization of Copper(I) Cluster Scintillators in Aqueous Environments
A new class of halogen bonding‐strengthened copper(I) cluster‐based X‐ray scintillators is developed, with higher lattice symmetry, reduced trap density, and enhanced stability in polar chemical environments surpassing the performance of halogen‐free counterparts and other conventional scintillators. Abstract Scintillators are essential in applications,
Chang Gu+3 more
wiley +1 more source
The Cloud is fast becoming a popular platform for SaaS, a popular software delivery model. This is because the Cloud has many advantages over the traditional private infrastructure, such as increased flexibility, no maintenance, less management burden ...
Annanda Rath+3 more
doaj +1 more source
Security and Privacy Issues in Cloud Computing [PDF]
Cloud computing transforming the way of information technology (IT) for consuming and managing, promising improving cost efficiencies, accelerate innovations, faster time-to-market and the ability to scale applications on demand (Leighton, 2009 ...
Ismail, H., Khan, M., Medvedev, M.
core
This work presents a systematic review of atmospheric turbulence fundamentals, including theoretical formulations and adaptive optics‐based mitigation strategies. This includes an in‐depth examination of the devices, theories, and methodologies associated with traditional correction approaches.
Qinghui Liu+5 more
wiley +1 more source
AN QUALITY BASED ENHANCEMENT OF USER DATA PROTECTION VIA FUZZY RULE BASED SYSTEMS IN CLOUD ENVIRONMENT [PDF]
So far, in cloud computing distinct customer is accessed and consumed enormous amount of services through web, offered by cloud service provider (CSP). However cloud is providing one of the services is, security-as-a-service to its clients, still people ...
R Poorva Devi, S Rajalakshmi
doaj
Vision‐Assisted Avocado Harvesting with Aerial Bimanual Manipulation
This work outlines the design and implementation of a bimanual aerial robot that employs visual perception and learning to detect, reach, and harvest avocados. A new gripper and fixer arm assembly is used to harvest avocados, while visual perception enables the detection of avocados and estimation of their position and orientation for determining ...
Zhichao Liu+3 more
wiley +1 more source
Cloud Security Metrics and Measurement
This research aims to investigate the cloud security metrics by exploring the existing frameworks, integrated approaches and quantitative measurements to enhance overall security in cloud environments. This study explains several established frameworks and standards, such as the CSA Cloud Controls Matrix, NIST SP 800-53 and ISO/IEC 27001, which are ...
openaire +2 more sources
In‐Hand Singulation, Scooping, and Cable Untangling with a 5‐Dof Tactile‐Reactive Gripper
This article presents a two‐fingered gripper with five degrees of freedom and a vision‐based tactile sensor for dexterous in‐hand manipulation. It performs complex tasks such as object singulation within granular media, scooping and precise card insertion, and cable untangling.
Yuhao Zhou+3 more
wiley +1 more source
The Internet of Things (IoT) provides a new paradigm for the development of heterogeneous and distributed systems, and it has increasingly become a ubiquitous computing service platform.
Xiang Li+5 more
doaj +1 more source